SpectorSoft
Keep an eye on your staff's Internet & Desktop Activity Company-Wide
Spector 360 will automatically capture all employee Internet and desktop activity whether they are in the office, traveling or working remotely on both Windows and Mac OS. Spector 360 can record:
Email/Webmail | Online Searches | File Transfers | |||
Chat/Instant Messages | Keystrokes Typed | Document Tracking | |||
Web Sites Visited | User Activity | Network Activity | |||
Application/Program Use |
In addition, through a camera recording tool, Spector 360 shows you in exact visual detail what an employee does moment by moment.
Comprehensive Reporting:
Spector 360 takes the recorded Internet and computer activities from each of your employees, feeds that information into a database and provides you with more than 50 built-in, comprehensive reports. With Spector 360 you will find answers to questions such as:
- Which employees spend the most time surfing web sites?
- Who is spending time on shopping sites, sports sites or adult sites?
- Which employees chat or use anonymous email services like Hotmail and Gmail?
- Who is sending the most emails with attachments?
- Which employees may be leaking company confidential information via removable media like flash drives, CDs and DVDs?
- Which employees are printing sensitive documents?
- Who is arriving to work late and leaving early? Who takes long lunch breaks?
- What are my employees searching for on Google, Yahoo and MSN?
These high-level reports and charts help you quickly identify those employees who are most likely engaging in activities that are harmful to your company.
Drill down Detailed Follow-up
If you detect a problem or suspect a specific employee is the main culprit of abuse, you can dig deeper and review every detail of their computer and Internet activity to gather the evidence you need.
More Than Monitoring
In addition to world-class monitoring, Spector 360 allows you to proactively control how your employees use the web by integrating Internet Filtering. Block access to specific web sites or to categories deemed inappropriate for your workplace. Restrict access by individual, group, department or the entire company. With more than thirty pre-defined web filtering categories, Spector 360 gives you the power to eliminate excessive and explicit Internet surfing while keeping your employees focused and on task.
Why use Spector 360?
With Spector 360 companies can uncover Internet abuse, lost productivity, leaking of confidential information and other inappropriate activities by their staff that expose them to financial, legal and other preventable risks.
TOP 5 REASONS COMPANIES TURN TO SPECTOR 360
Increase Productivity
Significantly reduce the amount of goofing off that has grown common in most workplaces. Spector 360 will cut this huge productivity drain by at least 75%.
Conduct Investigations and Document Violations
Any employee suspected of engaging in inappropriate, illegal, or unapproved conduct can be investigated with Spector 360.
Enforce Acceptable Use Policy/ IT Policy
Employees often believe that rules can be bent if no one is watching. Spector 360 ensures adherence to your policy for computer and Internet use. Lower the incidence and risks of sexual and racial harassment and occurrences of online gambling and surfing of pornography.
“Insider” Theft Protection
One in five employees will copy or print company-owned materials in the days leading up to their resignation. Others will routinely leak sensitive this web and confidential information, accidentally, intentionally, or otherwise. Spector 360 allows you to look back in time to detect this behavior.
Compliance with computer crime act: Meet or exceed the computer crime act and Industry, or Agency compliance requirements with Spector 360 by seamlessly maintaining records of communications and transactions – a requirement for many companies.